Quick&Easy Configuration HOWTO

Total Page:16

File Type:pdf, Size:1020Kb

Quick&Easy Configuration HOWTO Quick&Easy Configuration HOWTO Antonio Fragola Quick&Easy Configuration HOWTO Antonio Fragola Copyright © 2000 - 2001 Antonio Fragola Configurazione rapida e facile di una LinuxBox domestica. Diario delle revisioni Revisione 2.7 - 27 Agosto 2001 ampliamento della sezione Mutt (GPG e Hooks), e mini-sezione su grepmail Revisione 2.6 - 20 Agosto 2001 ampliamento della sezione Procmail (antispam e trucchetti) Revisione 2.5 - 5 Agosto 2001 nuova sezione Xinetd, modifiche sezioni Bash e Slrn (0.9.7.1) Revisione 2.4 - 4 Agosto 2001 nuova sezione sul Chroot del DNS Revisione 2.3 - 3 Agosto 2001 nuova sezione sui Wheelmouse Revisione 2.2 - 2 Agosto 2001 Firewall completamente modulare e modifiche Leafnode (filterfile e xinetd) Revisione 2.1 - 1 Agosto 2001 piccole modifiche sezioni Partizioni e Masterizzazione Revisione 2.0 - 1 Febbraio 2001 modularizzazione della sezione Firewall Revisione 1.9 - 29 Gennaio 2001 aggiunta la nuova sezione Masterizzazione Revisione 1.8 - 11 Gennaio 2001 revisione della sezione Dns Revisione 1.7 - 23 Novembre 2000 aggiunta la nuova sezione Servizi Revisione 1.6 - 31 Ottobre 2000 passaggio dal DTD Linuxdoc a Docbook Revisione 1.5 - 1 Ottobre 2000 ampliata le sezioni Postfix e Leafnode Revisione 1.4 - 14 Luglio 2000 corretti alcuni errori e aggiunta l’introduzione a Slrn Revisione 1.3 - 7 Luglio 2000 aggiunte le sottosezioni filesystem (Partizioni) e l’introduzione del Firewall Revisione 1.2 - 1 Luglio 2000 primo rilascio ufficiale su Sourceforge Revisione 1.1 - 23 Giugno 2000 aggiunta la breve sezione Varie Revisione 1.0 - 7 Giugno 2000 completata la sezione di Procmail Revisione 0.9 - 23 Maggio 2000 completato lo script di Firewall Revisione 0.8 - 5 Maggio 2000 inserimento della sezione Partizioni, estratta da un lavoro precedente Revisione 0.7 - 30 Aprile 2000 aggiunta la sezione Kernel Revisione 0.6 - 21 Aprile 2000 aggiunte le sezioni Mutt e Slrn Revisione 0.5 - 17 Marzo 2000 inizio stesura (bel modo di passare il giorno del proprio compleanno... ;-) ) Sommario Prefazione .......................................................................................................................................................................i 1. Informazioni base...............................................................................................................................................i 2. Altre informazioni ............................................................................................................................................ ii 1. Partizioni....................................................................................................................................................................1 1.1. Introduzione ...................................................................................................................................................1 1.2. Nozioni Generali ............................................................................................................................................1 1.3. Filesystem.......................................................................................................................................................4 1.4. Prerequisiti generali........................................................................................................................................7 1.5. FIPS................................................................................................................................................................9 1.6. FSRESIZE....................................................................................................................................................10 2. Loadlin .......................................................................................................................................................................1 3. Kernel.........................................................................................................................................................................4 3.1. Prerequisiti .....................................................................................................................................................4 3.2. Parametri ........................................................................................................................................................6 3.3. Compilazione e installazione .......................................................................................................................18 4. Internet.....................................................................................................................................................................21 5. Postfix .......................................................................................................................................................................26 5.1. Configurazione di Postfix .............................................................................................................................26 5.2. Disattivazione e disinstallazione di Sendmail ..............................................................................................31 6. Fetchmail .................................................................................................................................................................33 7. Procmail ...................................................................................................................................................................35 7.1. Introduzione .................................................................................................................................................35 7.2. File di configurazione...................................................................................................................................36 7.3. File di regole (esempi)..................................................................................................................................38 7.4. Usi avanzati e trucchetti ...............................................................................................................................42 7.5. Combattere lo SPAM....................................................................................................................................47 7.6. Sintassi delle espressioni regolari.................................................................................................................50 8. Leafnode...................................................................................................................................................................52 8.1. Configurazione .............................................................................................................................................52 8.2. Scorefile........................................................................................................................................................55 8.3. Leafnode+.....................................................................................................................................................63 9. Firewall ....................................................................................................................................................................65 10. DNS.........................................................................................................................................................................89 10.1. Configurazione di Bind ..............................................................................................................................89 10.2. Chrooting Bind...........................................................................................................................................99 4 11. Wwwoffle .............................................................................................................................................................108 12. Junkbuster ...........................................................................................................................................................110 13. Xinetd...................................................................................................................................................................112 13.1. Informazioni di base.................................................................................................................................112 13.2. Configurazione di base .............................................................................................................................118 13.3. Configurazione avanzata ..........................................................................................................................121 14. Mutt......................................................................................................................................................................125 14.1. File di configurazione .muttrc ..................................................................................................................125 14.2. Mutt e gli Hooks.......................................................................................................................................136 14.3. Tasti principali..........................................................................................................................................139 14.4. Grepmail e Mutt .......................................................................................................................................142
Recommended publications
  • Dwarf's Guide to Debian GNU/Linux
    Dwarf’s Guide to Debian GNU/Linux 2001 Dale Scheetz Dwarf’s Guide to Debian GNU/Linux Copyright c 2001 Dale Scheetz Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being Chapter 1 Introduction, with no Front-Cover Texts, and with the Back-Cover Texts being “The early development of the material in this work was produced with the financial support of Planet Linux. This support was intrumental in bringing this project to completion.” A copy of the license is included in the section entitled “Appendix 9: GNU Free Documentation License” which can be found on page 271. Trademark Acknowledgements All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. The publisher cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Apple and Macintosh are registered trademarks of Apple Computer, Inc. CP/M is a registered trademark of Caldera, Inc. IBM is a registered trademark of International Business Machines, Inc. MS is a trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. X Window System is a registered trademark of X Consortium, Inc. ii dedicated to Linux users everywhere iii CREDITS First I want to thank Ian Murdock for writing the History section. His per- spectives on those early years have helped latecomers like Dwarf understand the founding principles upon which Debian is based.
    [Show full text]
  • |I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer Et Al
    |I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer et al. (45) Date of Patent: Apr. 8, 1997 54 EXECUTING NETWORK LAYERED Hartig et al., "Operating System(s) on Top of Persistent COMMUNICATIONS OF A FIRST SYSTEM Object Systems-The Birlix Approach”, Jan. 1992, pp. ON A SECOND SYSTEM USINGA COMMUNICATION BRIDGE TRANSPARENT 790-799, IEEE. TO THE DIFFERENT COMMUNICATION LAYERS Primary Examiner-Thomas C. Lee 75 Inventors: Bruce D. Mayer, Arlington; Martin Assistant Examiner-Sang Hui Kim Berkowitz, Newton; Sudershan K. Attorney, Agent, or Firm-Gary D. Clapp, Faith F. Driscoll; Sharma, Brookline, all of Mass. John S. Solakian 73) Assignee: Bull HN Information Systems Inc., Billerica, Mass. (57) ABSTRACT 21 Appl. No.: 127,925 A layered communications bridge mechanism connected 22 Filed: Sep. 28, 1993 between an upper communications layer of a first commu (51) int. Cl. ..................... G06F 3/00 nications layer mechanism executing in a user level process 52 U.S. Cl. ................... 395/500; 364/264.3; 364/2809; and a layered communication kernel process of a second - 364/280; 364/DIG. 1 system corresponding to the next lower layers of the first 58) Field of Search .................................... 395/500, 2.86, communications layer mechanism. The bridge includes an 395/700, 650, 882, 892 upper bridge mechanism operating to appear to the lowest (56 References Cited layer or the layers of the first communications layer mecha U.S. PATENT DOCUMENTS nism to be the next lower layer of the first layered commu nications mechanism and a lower bridge mechanism oper 4,727,480 2/1988 Albright et al.
    [Show full text]
  • Open Source Watershed: Studying the Relationship Between Linux Package and Distribution Releases
    Open Source Watershed: Studying the Relationship Between Linux Package and Distribution Releases by Scott Shawcroft A senior thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science With Departmental Honors Computer Science & Engineering University of Washington June 2009 Presentation of work given on June 4 2009_ Thesis and presentation approved by Date Contents 1 Introduction 3 2 Background 3 3 Procedure 4 3.1 Gathering Data . 4 3.1.1 Filename Processing . 5 3.1.2 Distributions . 5 3.1.3 Packages . 7 3.2 Normalization . 8 3.2.1 Naming . 8 3.2.2 Version Ordering . 9 3.2.3 Gauging Data Quality . 10 4 Results 10 4.1 Analysis . 11 4.1.1 Upstream Releases Count . 11 4.1.2 Obsolete Packages . 12 4.1.3 Versions Behind . 13 4.1.4 Lag . 14 4.1.5 Fixed Versus Rolling Release Cycles . 15 4.2 Website . 16 4.2.1 Packages . 16 4.2.2 Distributions . 17 5 Conclusion 17 6 Future Work 18 7 Acknowledgments 19 1 Abstract Open Source Watershed is a research project aimed at gathering data to study the relationship between individual software projects, also known as upstream, and GNU/Linux distributions, also known as downstream. This is done by tracking package names, versions and release dates both upstream and downstream. Data is collected, or crawled, through a num- ber of Python scripts. Upstream sources are commonly crawled by listing http or ftp directories or RSS feeds. Eight different distributions are crawled. They were chosen because of their unique release and package management styles.
    [Show full text]
  • Software Libre Vs Software Propietario Ventajas Y Desventajas
    Software libre vs software propietario Ventajas y desventajas Culebro Ju´arez, Montserrat. G´omezHerrera, Wendy Guadalupe. Torres S´anchez, Susana. M´exico,Mayo 2006. ii ´Indice general Agradecimientos. VII Pr´ologo. IX Introducci´on. 1 1. Conceptos fundamentales sobre software. 3 1.1. Definici´onde software. 3 1.2. Definici´onde software libre. 3 1.3. Definici´onde software propietario. 4 1.3.1. Software propietario. 4 1.3.2. Objeciones al t´ermino “propietario”. 5 1.3.3. Software privativo. 5 1.3.4. Objeciones al t´ermino “privativo”. 5 1.3.5. Software no libre. 5 1.3.6. Objeciones al t´ermino “no libre”. 5 1.3.7. Software privado. 5 1.3.8. Objeciones al t´ermino “privado”. 6 1.3.9. Software con propietario. 6 1.3.10. Objeciones al t´ermino “con propietario”. 6 1.4. Software semilibre. 6 1.5. Freeware. 6 1.6. Shareware. 7 1.7. Abandonware. 7 1.8. Warez. 7 2. Visi´onhist´oricadel software. 9 2.1. La importancia del software. 9 2.2. Incursi´onde los hackers. 10 2.3. La cultura Unix. 10 2.4. GNU. 11 2.5. Libertad y costo. 12 2.6. Linux. 12 2.7. Open Source (c´odigoabierto). 14 2.8. El papel del software libre en el crecimiento de Internet. 14 2.9. Formatos abiertos. 15 2.10. Visi´onhist´oricadel Software propietario (Microsoft). 15 iii 3. Copyright, copyleft y patentes. 17 3.1. Copyright. 17 3.1.1. Derecho de autor y Copyright. 17 3.1.2. El contrato de copyright.
    [Show full text]
  • Open Source Software – Breaking the Commercial Myths Abstract Where
    Open Source Software – Breaking the IJoAT Commercial Myths Volume 3, No 1 International Journal of Advancements in Technology - ISSN : 0976-4860 (Online) Guest Editorial Article Atul Sharma, Ph. D. Abstract Open source technologies need no formal introduction. In a technological era where major giants like Microsoft are coming up with new versions of their software in each quarter, there are open source players like Ubuntu, which are gaining popularity at amazingly crazy rates. Global community consisting of thousands of best brains in this world are coming up together to build up robust Open Source technologies which are in no way lesser in features when compared to their commercial counterparts. In fact if we go out and ask Open Source enthusiast, we find that they are far more efficient, reliable, and over all customizable. From IBM to Google, Firefox to Wikipedia – some of today's best software is based on an open-source model [1]. Open Source communities like Ubuntu share the principle of “Shared efforts. Shared principles. No cost.”, that’s why what we get is a world class “free” software. Where do we find Open Source Look into any technological field, and we find a reliable Open source available at our disposal. Talk about Web-Servers, and we have a big name of Apache HTTP Server [3] probably outshining [4] its commercial counterpart “Microsoft IIS”. For ecommerce, initiating a new branch of the economy, even in small company is nowadays not so hard, all credited to OSS like osCommerece, Magento and OpenCart [5]. We have OSS in internet browsers like Mozilla Firefox [6], VoIP applications like Asterisk (PBX) [7], and office suite of inter-related desktop applications in form of OpenOffice [8].
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Version : 2009K Vendor: Centos Release : 1.El5 Build Date
    Name : tzdata Relocations: (not relocatable) Version : 2009k Vendor: CentOS Release : 1.el5 Build Date: Mon 17 Aug 2009 06:43:09 PM EDT Install Date: Mon 19 Dec 2011 12:32:58 PM EST Build Host: builder16.centos.org Group : System Environment/Base Source RPM: tzdata-2009k- 1.el5.src.rpm Size : 1855860 License: GPL Signature : DSA/SHA1, Mon 17 Aug 2009 06:48:07 PM EDT, Key ID a8a447dce8562897 Summary : Timezone data Description : This package contains data files with rules for various timezones around the world. Name : nash Relocations: (not relocatable) Version : 5.1.19.6 Vendor: CentOS Release : 54 Build Date: Thu 03 Sep 2009 07:58:31 PM EDT Install Date: Mon 19 Dec 2011 12:33:05 PM EST Build Host: builder16.centos.org Group : System Environment/Base Source RPM: mkinitrd-5.1.19.6- 54.src.rpm Size : 2400549 License: GPL Signature : DSA/SHA1, Sat 19 Sep 2009 11:53:57 PM EDT, Key ID a8a447dce8562897 Summary : nash shell Description : nash shell used by initrd Name : kudzu-devel Relocations: (not relocatable) Version : 1.2.57.1.21 Vendor: CentOS Release : 1.el5.centos Build Date: Thu 22 Jan 2009 05:36:39 AM EST Install Date: Mon 19 Dec 2011 12:33:06 PM EST Build Host: builder10.centos.org Group : Development/Libraries Source RPM: kudzu-1.2.57.1.21- 1.el5.centos.src.rpm Size : 268256 License: GPL Signature : DSA/SHA1, Sun 08 Mar 2009 09:46:41 PM EDT, Key ID a8a447dce8562897 URL : http://fedora.redhat.com/projects/additional-projects/kudzu/ Summary : Development files needed for hardware probing using kudzu.
    [Show full text]
  • Software Libre Vs Software Propietario Ventajas Y Desventajas
    Software libre vs software propietario Ventajas y desventajas Culebro Ju´arez, Montserrat. G´omezHerrera, Wendy Guadalupe. Torres S´anchez, Susana. M´exico,Mayo 2006. ii ´Indice general Agradecimientos. VII Pr´ologo. IX Introducci´on. 1 1. Conceptos fundamentales sobre software. 3 1.1. Definici´onde software. 3 1.2. Definici´onde software libre. 3 1.3. Definici´onde software propietario. 4 1.3.1. Software propietario. 4 1.3.2. Objeciones al t´ermino “propietario”. 5 1.3.3. Software privativo. 5 1.3.4. Objeciones al t´ermino “privativo”. 5 1.3.5. Software no libre. 5 1.3.6. Objeciones al t´ermino “no libre”. 5 1.3.7. Software privado. 5 1.3.8. Objeciones al t´ermino “privado”. 6 1.3.9. Software con propietario. 6 1.3.10. Objeciones al t´ermino “con propietario”. 6 1.4. Software semilibre. 6 1.5. Freeware. 6 1.6. Shareware. 7 1.7. Abandonware. 7 1.8. Warez. 7 2. Visi´onhist´oricadel software. 9 2.1. La importancia del software. 9 2.2. Incursi´onde los hackers. 10 2.3. La cultura Unix. 10 2.4. GNU. 11 2.5. Libertad y costo. 12 2.6. Linux. 12 2.7. Open Source (c´odigoabierto). 14 2.8. El papel del software libre en el crecimiento de Internet. 14 2.9. Formatos abiertos. 15 2.10. Visi´onhist´oricadel Software propietario (Microsoft). 15 iii 3. Copyright, copyleft y patentes. 17 3.1. Copyright. 17 3.1.1. Derecho de autor y Copyright. 17 3.1.2. El contrato de copyright.
    [Show full text]
  • Heal Th Care Services
    ALAMEDA COUNTY HEALTH CARE SERVICES AGENCY REBECCA GEBHART, Interim Director AGENDA ITEM NO March21, 2017 ADMINISTRATION & INDIGENT HEAL TH 1000 San Leandro Boulevard, Suite 300 San Leandro, CA 94577 TEL: (510) 618-3452 FAX: (510) 351-1367 February 14, 2017 The Honorable Board of Supervisors County of Alameda 1221 Oak Street Oakland, CA 94612 SUBJECT: APPROVE THE STANDARD SERVICES AGREEMENT WITH YELLOWFINBI NORTH AMERICA IN THE AMOUNT OF $234,416 TO PROVIDE DASHBOARD AND REPORT GENERATION WEB BASED SOFTWARE FOR THE PERIOD OF FEBRUARY 1, 2017 THROUGH JUNE 30, 2019 Dear Board Members, RECOMMENDATION: Approve and authorize the President of the Board of Supervisors to sign the standard services agreement with Yellowfinbi North America Inc. (Principal: Bryan Reece, Director; Location: Ketchum, ID; Procurement Contract: 14638) to provide web-based dashboard reporting system services in an amount not to exceed $234,416 for the term of 2/1117-6/30/19 (29 months). DISCUSSION/SUMMARY: Your approval of the Standard Services Agreement will allow Behavioral Health Care Services (BHCS) to continue to provide Yellowfins' licensed software and support to generate dashboard reports which provide program analysis of BHCS delivery system to our community. The dashboards will provide BHCS staff with real-time access to service utilization and performance metric data. This software will be deployed across all of Health Care Services Agency and will serve to reinforce and facilitate a culture of data-driven decision-making. On May 2, 2012, the Board of Supervisors approved a contract agreement (procurement contract 7601) with Emanio Inc. to develop and install a web-based dashboard and report generation system that was based on the software owned and developed by Y ellowfin International Pty.
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]
  • Leafnode FAQ Dr
    Leafnode FAQ Dr. Cornelius Krasel Matthias Andree Copyright © 2002 Cornelius Krasel Copyright © 2002, 2003, 2004, 2005, 2006, 2009 Matthias Andree $Date: 2006/04/09 17:19:32 $ Table of Contents Leafnode frequently asked questions, with answers. .............................................................................. 1 Installation-related problems, including relocations ...................................................................... 1 Configuration problems ........................................................................................................... 2 Problems at run time ............................................................................................................... 3 Problems with particular newsreaders ........................................................................................ 5 Obtaining a stack backtrace .............................................................................................................. 6 From a core file. .................................................................................................................... 6 Running a program under gdb supervision. ................................................................................. 6 From a running/hanging leafnode program. ................................................................................. 7 Red Hat and the inetd vs. xinetd issue. ............................................................................................... 7 Leafnode frequently asked questions, with an-
    [Show full text]
  • Open Source Freeware : 400+ Free Applications and Utilities
    Open Source Freeware : 400+ free applications and utilities Anti-Spyware/Anti-Virus/Anti-Rootkit Freeware Utilities : I want to ... 1. protect the computer against viruses : ClamWin Free Antivirus 2. protect the computer against viruses : The OpenAntivirus Project 3. protect the computer with a firewall : PktFilter 4. Check out more free software : I want a Freeware Utility to ... 450+ common problems solved. 5. Suggestions/corrections : eConsultant : Blog Archive : I want Open Source Freeware Audio/Music/MP3/Real/Wav Freeware Utilities : I want to ... 1. adjust sound volume of mp3 files : MP3Gain 2. burn an audio CD : Easy Burning 3. burn an audio CD : cdrtfe 4. burn an audio CD : jCDWriter 5. copy an audio CD : CDRDAO 6. correct/edit tags of mp3 files : Mp3 Tag Tools 7. correct/edit tags of mp3 files : MP3 Book Helper 8. correct/edit tags of mp3 files : MusicBrainz Tagger! 9. correct/edit tags of mp3 files : MP3-Info Extension 10. cut/edit/mix/record/remix sound files : Audacity 11. manage CD collection : Ant Movie Catalog 12. mix audio files : Mixere 13. play an audio file : Coolplayer 14. play an audio file : LongPlayer 15. play an audio file : SnackAmp 16. play an audio file : NotifyCD 17. play an audio file : musikCube 18. play an audio file : Delphamp 19. play an audio file : Zinf 20. record save/ audio/video from screen : Krut Computer Recorder 21. record/save an internet audio broadcast : Juice 22. record/save streaming music : ASFRecorder 23. record/save streaming music : Streamripper for Winamp 24. record/save streaming music : StationRipper 25. rip music from a CD : MediaCoder 26.
    [Show full text]